Hackers don’t discriminate
Upcoming SlideShare
Loading in...5
×
 

Hackers don’t discriminate

on

  • 193 views

Historically, few viruses have been written to attack Mac-based operating systems. But as the popularity of these devices has increased, so has the popularity of Mac-targeted malware. Regardless of ...

Historically, few viruses have been written to attack Mac-based operating systems. But as the popularity of these devices has increased, so has the popularity of Mac-targeted malware. Regardless of whether your organization uses Windows-based PCs or Macs or a mix of both, you need a solution that provides protection for all operating systems.

Statistics

Views

Total Views
193
Views on SlideShare
193
Embed Views
0

Actions

Likes
0
Downloads
0
Comments
0

0 Embeds 0

No embeds

Accessibility

Categories

Upload Details

Uploaded via as Adobe PDF

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

    Hackers don’t discriminate Hackers don’t discriminate Document Transcript

    • GFI White Paper Hackers don’t discriminate:Viruses attack all platform usersHistorically, few viruses have been written to attack Mac-based operating systems. But as the popularity of these devices has increased, so has the popularity of Mac-targeted malware.Regardless of whether your organization uses Windows-basedPCs or Macs or a mix of both, you need a solution that provides protection for all operating systems.
    • Contents Introduction 3 Why Apple is a target 3 Mac-based attacks on the rise 3 How to protect all operating systems 3 Conclusion 4 About GFI VIPRE® Antivirus Business 4 About GFI 4Hackers don’t discriminate: Viruses attack all platform users 2
    • This white paper explains why Apple has become a popular target for malware writers, outlines recent Macmalware attacks and offers specific strategies to secure both PCs and Macs.Why Apple is a targetThe successful launches of the iPod, iPhone and iPad have catapulted Apple to the forefront of the technologyindustry. Consumers are now using these Mac OS-based devices to conduct work, and businesses areincreasingly allowing their use on corporate networks, if not outright adopting them for company use.With this rise in popularity, hackers and cybercriminals have now turned their attention to this traditionallyignored audience. However, PC users are far from in the clear. IT security researchers, say hundreds, if notthousands, of new malware codes are discovered every month. New threats are targeting Macs as well as PCs,so it’s important to protect your organization’s devices and network against both.Mac-based attacks on the riseMany Mac users think their machines are impervious to malware, according to Alex Stamos, a securityanalyst with iSEC Partners. At the 2011 Black Hat conference, he reported that while most users think PCs aresusceptible to virus attacks, only 20 percent believe Macs are vulnerable. This perception is a dangerous one,as Mac users may be less suspicious or prepared for malware on their browsers or in their inboxes.Cybercriminals are clever in their use of social engineering techniques to lure users into unwittinglydownloading viruses or other malware. For example, the recent Mac Defender Trojan – also known as theMac Security Trojan, Mac Protector Trojan, Mac Guard Trojan and Mac Shield Trojan e has caught many Macusers, and even IT professionals, by surprise. This Trojan creates an authentic-looking popup in Mac browsers,warning users that a virus has been detected and suggesting an antivirus program be downloaded. If the usercomplies, he or she is prompted to pay a license fee for the “protective” software and his or her credit card andpersonal information are collected.Other malware, originally written for PC operating systems, has now been retargeted towards Macs. Take thesocial networking worm Koobface. First detected in 2008, it posts messages with malicious links on Facebook,Myspace and Twitter users’ feeds. These links prompt followers to download fake updates and programs, suchas an Adobe Flash update, that launch the Koobface worm on the downloaders’ machines. A new versionof Koobface that targets Mac OS X users, sometimes referred to as Boonana, was detected two years later, inNovember 2010.How to protect all operating systemsFor both Windows- and Mac-based operating systems, there are certain security measures you must take toprotect your employees and your corporate data. First, it’s critical to raise employee awareness of the generaldangers of malware, as well as the latest known threats. Prepare employees for the types of malware theymay come across by showing them examples. You might hold a seminar and share screenshots of the MacDefender Trojan or the Koobface worm or create a monthly newsletter that outlines new threats and howto protect against them. By demonstrating just how real and convincing these attacks can be, you’ll showemployees how easy it is to fall victim to them.While employee education is a powerful approach, antivirus protection is also essential to your businesssecurity. Not all business AV solutions are equal, and the one you choose should include: » Powerful scanning technology. High-quality AV solutions will analyze and detect potential viruses and malware before they infect user machines » Active monitoring and protection. Most SMBs don’t have the time or resources to constantly monitor their networks for security threats. Invest in a solution that protects your network and user machines in real time, automatically. » Malicious web filtering. Block bad URLs before they hit your network with a solution that uses the latest behavioral analysis and malware URL detection technology.Hackers don’t discriminate: Viruses attack all platform users 3
    • ConclusionToday’s corporate IT environments are often a mixed bag, supporting not only a variety of devices –smartphones, tablets, laptops and desktops – but also a combination of Windows and Mac operating systems.Companies must take a practical approach in protecting against malware threats that attack both PCs andMacs. By combining employee education with powerful AV security technology, your organization canmitigate the risks of threats targeting all types of devices and platforms.About GFI VIPRE® Antivirus BusinessVIPRE Antivirus Business combines the latest antivirus and anti-spyware detection and removal technologiesto protect against next-generation malware threats in a comprehensive and highly efficient manner. Built byIT administrators for IT administrators, VIPRE is easy to install, easy to deploy and easy to manage with minimalnetwork and system performance impact. The solution delivers superior endpoint protection against viruses,worms, spyware, Trojans, bots and rootkits via a single, powerful anti-malware engine and wide range ofdetection methods, including Cobra™ heuristics for first-level heuristic analysis and Active Protection™ for real-time malware detection inside the Windows kernel.For more information, visit http://www.gfi.com/business-antivirus-software.About GFIGFI Software provides web and mail security, archiving, backup and fax, networking and security softwareand hosted IT solutions for small to medium-sized businesses (SMBs) via an extensive global partnercommunity. GFI products are available either as on-premise solutions, in the cloud or as a hybrid of bothdelivery models. With award-winning technology, a competitive pricing strategy, and a strong focus on theunique requirements of SMBs, GFI satisfies the IT needs of organizations on a global scale. The company hasoffices in the United States (North Carolina, California and Florida), UK (London and Dundee), Austria, Australia,Malta, Hong Kong, Philippines and Romania, which together support hundreds of thousands of installationsworldwide. GFI is a channel-focused company with thousands of partners throughout the world and is also aMicrosoft Gold Certified Partner.More information about GFI can be found at http://www.gfi.com.Hackers don’t discriminate: Viruses attack all platform users 4
    • USA, CANADA AND CENTRAL AND SOUTH AMERICA GFI 2011 Nov0133 North Garden Ave, Suite 1200, Clearwater, FL USATelephone: +1 (888) 688-8457Fax: +1 (727) 562-5199ussales@gfi.com15300 Weston Parkway, Suite 104, Cary, NC 27513, USATelephone: +1 (888) 243-4329Fax: +1 (919) 379-3402ussales@gfi.comUK AND REPUBLIC OF IRELANDMagna House, 18-32 London Road, Staines, Middlesex, TW18 4BP, UKTelephone: +44 (0) 870 770 5370Fax: +44 (0) 870 770 5377sales@gfi.co.ukEUROPE, MIDDLE EAST AND AFRICAGFI House, San Andrea Street, San Gwann, SGN 1612, MaltaTelephone: +356 2205 2000Fax: +356 2138 2419sales@gfi.comAUSTRALIA AND NEW ZEALAND83 King William Road, Unley 5061, South AustraliaTelephone: +61 8 8273 3000Fax: +61 8 8273 3099sales@gfiap.comFor a full list of GFI offices/contact details worldwide, please visit http://www.gfi.com/contactusDisclaimer© 2011. GFI Software. All rights reserved. All product and company names herein may be trademarks of their respective owners.The information and content in this document is provided for informational purposes only and is provided “as is” with no warranty of any kind, either express or implied, including butnot limited to the implied warranties of merchantability, fitness for a particular purpose, and non-infringement. GFI Software is not liable for any damages, including any consequentialdamages, of any kind that may result from the use of this document. The information is obtained from publicly available sources. Though reasonable effort has been made to ensure theaccuracy of the data provided, GFI makes no claim, promise or guarantee about the completeness, accuracy, recency or adequacy of information and is not responsible for misprints, out-of-date information, or errors. GFI makes no warranty, express or implied, and assumes no legal liability or responsibility for the accuracy or completeness of any information contained inthis document.If you believe there are any factual errors in this document, please contact us and we will review your concerns as soon as practical.